H04L47/745

Data-analysis-based class of service management for different web resource sections

Management of class of service profiles for packet transmission is facilitated by a processor(s) obtaining one class of service (CoS) profile for one web resource section of a web resource, and another CoS profile for another web resource section of the web resource, where the one CoS profile and the other CoS profile are different CoS profiles for use in transmitting packets of the web resource over a network. The processor(s) determines which resource section a packet to be transmitted is associated with, and based on the packet being associated with the one web resource section, the processor(s) associates the one CoS profile with the packet for directing a transmission service for the packet. Based on the packet being associated with the other web resource section, the other CoS profile is associated with the packet for directing the transmission service for the packet.

Predicting wait time for new session initiation during increased data traffic latency

A system includes at least one server that is configured to provide a multi-client network service to a plurality of existing users. When the server receives requests to join the multi-client network service from new users, the server may issue timestamps to each new user, obtain load metric based on the requests or timestamps, and collect the load metric to obtain historical data characterizing a demand in the multi-client network service over time. Further, based on the historical data, the server can predict a future load demand in the multi-client network service and selectively enable to join the multi-client network service by at least one of the plurality of new users based on the future load demand.

METHODS AND APPARATUSES FOR PROVIDING INTERNET-BASED PROXY SERVICES

A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities. The proxy server and the origin servers are also owned by different entities. The proxy server analyzes each request it receives to determine whether that request poses a threat and whether the visitor belonging to the request poses a threat. The proxy server blocks those requests from visitors that pose a threat or in which the request itself poses a threat. The proxy server transmits the requests that are not a threat and is from a visitor that is not a threat to the appropriate origin server.

Remote port for network connectivity for non-colocated customers of a cloud exchange

In general, techniques are described for network connectivity for non-colocated customers of a cloud exchange. A programmable network platform for the cloud exchange comprises processing circuitry configured to: configure a virtual network device in the data center to run a network service for a customer; receive, from the customer, a request for a remote port and network information for a network service provider connectivity service for the customer; assign, in response to receiving the request for the remote port, a remote port of the cloud exchange to the customer; and configure, in response to receiving the request for the remote port using the network information, the cloud exchange to connect the network service provider connectivity service to the virtual network device via the remote port of the cloud exchange.

REDUCING PLACEMENT CONFLICTS BETWEEN CONCURRENT VIRTUAL MACHINE ALLOCATIONS
20230362103 · 2023-11-09 ·

The present disclosure relates to systems, methods, and computer readable media for reducing placement conflicts between allocation agents tasked with allocating computing resources on a computing zone. For example, systems disclosed herein may identify placement conflicts between multiple allocation agents processing incoming placement requests on a computing zone. The systems disclosed herein may further modify a placement policy based on the number of placement conflicts by reducing one or more restrictions on rules for allocating computing resources. For example, the systems disclosed herein may enlarge a placement zone of server nodes when allocating computing resources to prevent or otherwise reduce conflicts between multiple allocation agents implementing the same placement policies. By reducing allocation restrictions and enlarging a placement zone, the systems described herein may significantly reduce placement conflicts while still optimizing placement of services on nodes of a cloud computing system.

Methods and apparatus for supporting network access using cable and radio communications links

Both wireless communication and communications via a cable modem are supported between a network node and a customer premises. Alternative communications links provide redundancy and the possibility to take advantage of the different types of links capacity to provide a level of service that would not be possible using a single communications link to a customer premises. In various embodiments a network node, such as a cable network node hubsite, has an optical connection to the Internet or another communications network and provides network access to one or a plurality of customer premises. The network node includes a wireless access point, e.g., pole mounted base station, as well as one or more cable modem interfaces to thereby allow for both wireless and cable modem based communications. This allows for packets of different applications to traverse different links and/or to switch between links in the event of maintenance or reliability issues.

System for utilizing resources from multiple sources to complete a resource distribution

Embodiments of the invention are directed to systems, methods and computer program products for utilizing resources from multiple sources to complete a resource distribution. The invention may receive a distribution request from an entity, where the distribution request includes information identifying a first resource distribution device provided by a user to the entity, a first source associated with the user, and a request amount of resources. The invention may determine whether the requested amount of resources is greater than a first amount of resources in the first source, determine whether the first resource distribution device is associated with one or more other sources associated with the user, and determine whether a sum of the first amount of resources in the first source and a second amount of resources in the one or more other sources is greater than or equal to the requested amount of resources.

User-based data tiering

Techniques are provided for user-based data tiering. In an example, a computer maintains a first-in-first-out queue that logs a finite set of users that have most-recently modified a file. This queue can be maintained in an extended attribute of an inode that corresponds to a file. A computer can also maintain a policy that defines how to perform storage tiering on a file based on which users have accessed the file. When a tiering operation is performed, the files specified by a corresponding tiering policy can be evaluated for which users have recently accessed them. When a user specified by the tiering policy has recently modified a file, the file can be placed in tiering queue for tiering.

Computationally efficient analysis and management of systems modeled as networks

A technique is described for quantifying a change in a system parameter in response to a perturbation of another system parameter. The technique identifies a region of influence of the perturbation and limits the propagation of the perturbation to the identified region.

Automated decision techniques for controlling resource access

A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.